Rules

  1. No Denial of Service
  2. No sharing flags, exploits, or hints
  3. No attacks against our infrastructure
  4. No automated scanning
  5. Flag form: Aero{.*} (The task description may include a refinement a flag format)